VAR-202410-0405

Vulnerability from variot - Updated: 2024-10-23 22:43

An unauthenticated local attacker can decrypt the devices config file and therefore compromise the device due to a weak implementation of the encryption used. MB CONNECT LINE of mbnet.mini Products from multiple vendors, such as firmware, have vulnerabilities related to encryption strength.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state

Show details on source website

{
  "@context": {
    "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
    "affected_products": {
      "@id": "https://www.variotdbs.pl/ref/affected_products"
    },
    "configurations": {
      "@id": "https://www.variotdbs.pl/ref/configurations"
    },
    "credits": {
      "@id": "https://www.variotdbs.pl/ref/credits"
    },
    "cvss": {
      "@id": "https://www.variotdbs.pl/ref/cvss/"
    },
    "description": {
      "@id": "https://www.variotdbs.pl/ref/description/"
    },
    "exploit_availability": {
      "@id": "https://www.variotdbs.pl/ref/exploit_availability/"
    },
    "external_ids": {
      "@id": "https://www.variotdbs.pl/ref/external_ids/"
    },
    "iot": {
      "@id": "https://www.variotdbs.pl/ref/iot/"
    },
    "iot_taxonomy": {
      "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
    },
    "patch": {
      "@id": "https://www.variotdbs.pl/ref/patch/"
    },
    "problemtype_data": {
      "@id": "https://www.variotdbs.pl/ref/problemtype_data/"
    },
    "references": {
      "@id": "https://www.variotdbs.pl/ref/references/"
    },
    "sources": {
      "@id": "https://www.variotdbs.pl/ref/sources/"
    },
    "sources_release_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_release_date/"
    },
    "sources_update_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_update_date/"
    },
    "threat_type": {
      "@id": "https://www.variotdbs.pl/ref/threat_type/"
    },
    "title": {
      "@id": "https://www.variotdbs.pl/ref/title/"
    },
    "type": {
      "@id": "https://www.variotdbs.pl/ref/type/"
    }
  },
  "@id": "https://www.variotdbs.pl/vuln/VAR-202410-0405",
  "affected_products": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/affected_products#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "model": "rex 300",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "helmholz",
        "version": "5.1.11"
      },
      {
        "model": "mbnet.mini",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "mbconnectline",
        "version": "2.3.1"
      },
      {
        "model": "mbnet",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "mbconnectline",
        "version": "8.2.1"
      },
      {
        "model": "rex 100",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "helmholz",
        "version": "2.3.1"
      },
      {
        "model": "mymbconnect24",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "mbconnectline",
        "version": "2.16.3"
      },
      {
        "model": "rex 250",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "helmholz",
        "version": "8.2.1"
      },
      {
        "model": "mbspider mdh 916",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "mbconnectline",
        "version": "2.6.5"
      },
      {
        "model": "rex 200",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "helmholz",
        "version": "8.2.1"
      },
      {
        "model": "mbspider mdh 915",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "mbconnectline",
        "version": "2.6.5"
      },
      {
        "model": "mbspider mdh 905",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "mbconnectline",
        "version": "2.6.5"
      },
      {
        "model": "mbspider mdh 906",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "mbconnectline",
        "version": "2.6.5"
      },
      {
        "model": "mbnet hw1",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "mbconnectline",
        "version": "5.1.11"
      },
      {
        "model": "mbnet.rokey",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "mbconnectline",
        "version": "8.2.1"
      },
      {
        "model": "myrex24 v2 virtual server",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "helmholz",
        "version": "2.16.3"
      },
      {
        "model": "mbconnect24",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "mbconnectline",
        "version": "2.16.3"
      },
      {
        "model": "mbnet",
        "scope": null,
        "trust": 0.8,
        "vendor": "mb connect line",
        "version": null
      },
      {
        "model": "mbnet.mini",
        "scope": null,
        "trust": 0.8,
        "vendor": "mb connect line",
        "version": null
      },
      {
        "model": "mbconnect24",
        "scope": null,
        "trust": 0.8,
        "vendor": "mb connect line",
        "version": null
      },
      {
        "model": "mymbconnect24",
        "scope": null,
        "trust": 0.8,
        "vendor": "mb connect line",
        "version": null
      },
      {
        "model": "rex 300",
        "scope": null,
        "trust": 0.8,
        "vendor": "helmholz",
        "version": null
      },
      {
        "model": "myrex24 v2 virtual server",
        "scope": null,
        "trust": 0.8,
        "vendor": "helmholz",
        "version": null
      },
      {
        "model": "rex 100",
        "scope": null,
        "trust": 0.8,
        "vendor": "helmholz",
        "version": null
      },
      {
        "model": "rex 200",
        "scope": null,
        "trust": 0.8,
        "vendor": "helmholz",
        "version": null
      },
      {
        "model": "mbspider mdh 915",
        "scope": null,
        "trust": 0.8,
        "vendor": "mb connect line",
        "version": null
      },
      {
        "model": "mbspider mdh 905",
        "scope": null,
        "trust": 0.8,
        "vendor": "mb connect line",
        "version": null
      },
      {
        "model": "mbnet hw1",
        "scope": null,
        "trust": 0.8,
        "vendor": "mb connect line",
        "version": null
      },
      {
        "model": "mbspider mdh 906",
        "scope": null,
        "trust": 0.8,
        "vendor": "mb connect line",
        "version": null
      },
      {
        "model": "mbspider mdh 916",
        "scope": null,
        "trust": 0.8,
        "vendor": "mb connect line",
        "version": null
      },
      {
        "model": "rex 250",
        "scope": null,
        "trust": 0.8,
        "vendor": "helmholz",
        "version": null
      },
      {
        "model": "mbnet.rokey",
        "scope": null,
        "trust": 0.8,
        "vendor": "mb connect line",
        "version": null
      }
    ],
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2024-010550"
      },
      {
        "db": "NVD",
        "id": "CVE-2024-45273"
      }
    ]
  },
  "cve": "CVE-2024-45273",
  "cvss": {
    "@context": {
      "cvssV2": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
      },
      "cvssV3": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
      },
      "severity": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/cvss/severity#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/severity"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "cvssV2": [],
        "cvssV3": [
          {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "author": "nvd@nist.gov",
            "availabilityImpact": "HIGH",
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "exploitabilityScore": 1.8,
            "id": "CVE-2024-45273",
            "impactScore": 5.9,
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "trust": 1.0,
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "author": "info@cert.vde.com",
            "availabilityImpact": "HIGH",
            "baseScore": 8.4,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "exploitabilityScore": 2.5,
            "id": "CVE-2024-45273",
            "impactScore": 5.9,
            "integrityImpact": "HIGH",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "trust": 1.0,
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          {
            "attackComplexity": "Low",
            "attackVector": "Local",
            "author": "NVD",
            "availabilityImpact": "High",
            "baseScore": 7.8,
            "baseSeverity": "High",
            "confidentialityImpact": "High",
            "exploitabilityScore": null,
            "id": "CVE-2024-45273",
            "impactScore": null,
            "integrityImpact": "High",
            "privilegesRequired": "Low",
            "scope": "Unchanged",
            "trust": 0.8,
            "userInteraction": "None",
            "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.0"
          }
        ],
        "severity": [
          {
            "author": "nvd@nist.gov",
            "id": "CVE-2024-45273",
            "trust": 1.0,
            "value": "HIGH"
          },
          {
            "author": "info@cert.vde.com",
            "id": "CVE-2024-45273",
            "trust": 1.0,
            "value": "HIGH"
          },
          {
            "author": "NVD",
            "id": "CVE-2024-45273",
            "trust": 0.8,
            "value": "High"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2024-010550"
      },
      {
        "db": "NVD",
        "id": "CVE-2024-45273"
      },
      {
        "db": "NVD",
        "id": "CVE-2024-45273"
      }
    ]
  },
  "description": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/description#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "An unauthenticated local attacker can decrypt the devices config file and therefore compromise the device due to a weak implementation of the encryption used. MB CONNECT LINE of mbnet.mini Products from multiple vendors, such as firmware, have vulnerabilities related to encryption strength.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state",
    "sources": [
      {
        "db": "NVD",
        "id": "CVE-2024-45273"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2024-010550"
      }
    ],
    "trust": 1.62
  },
  "external_ids": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/external_ids#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "db": "NVD",
        "id": "CVE-2024-45273",
        "trust": 2.6
      },
      {
        "db": "CERT@VDE",
        "id": "VDE-2024-056",
        "trust": 1.8
      },
      {
        "db": "CERT@VDE",
        "id": "VDE-2024-068",
        "trust": 1.8
      },
      {
        "db": "CERT@VDE",
        "id": "VDE-2024-069",
        "trust": 1.8
      },
      {
        "db": "CERT@VDE",
        "id": "VDE-2024-066",
        "trust": 1.8
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2024-010550",
        "trust": 0.8
      }
    ],
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2024-010550"
      },
      {
        "db": "NVD",
        "id": "CVE-2024-45273"
      }
    ]
  },
  "id": "VAR-202410-0405",
  "iot": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/iot#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": true,
    "sources": [
      {
        "db": "VARIoT devices database",
        "id": null
      }
    ],
    "trust": 0.5
  },
  "last_update_date": "2024-10-23T22:43:38.071000Z",
  "problemtype_data": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "problemtype": "CWE-326",
        "trust": 1.0
      },
      {
        "problemtype": "CWE-261",
        "trust": 1.0
      },
      {
        "problemtype": "Use Weak Ciphers for Passwords (CWE-261) [ others ]",
        "trust": 0.8
      },
      {
        "problemtype": " Inappropriate cryptographic strength (CWE-326) [NVD evaluation ]",
        "trust": 0.8
      }
    ],
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2024-010550"
      },
      {
        "db": "NVD",
        "id": "CVE-2024-45273"
      }
    ]
  },
  "references": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/references#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "trust": 1.8,
        "url": "https://cert.vde.com/en/advisories/vde-2024-056"
      },
      {
        "trust": 1.8,
        "url": "https://cert.vde.com/en/advisories/vde-2024-066"
      },
      {
        "trust": 1.8,
        "url": "https://cert.vde.com/en/advisories/vde-2024-068"
      },
      {
        "trust": 1.8,
        "url": "https://cert.vde.com/en/advisories/vde-2024-069"
      },
      {
        "trust": 0.8,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2024-45273"
      }
    ],
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2024-010550"
      },
      {
        "db": "NVD",
        "id": "CVE-2024-45273"
      }
    ]
  },
  "sources": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2024-010550"
      },
      {
        "db": "NVD",
        "id": "CVE-2024-45273"
      }
    ]
  },
  "sources_release_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2024-10-18T00:00:00",
        "db": "JVNDB",
        "id": "JVNDB-2024-010550"
      },
      {
        "date": "2024-10-15T11:15:11.940000",
        "db": "NVD",
        "id": "CVE-2024-45273"
      }
    ]
  },
  "sources_update_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2024-10-18T03:31:00",
        "db": "JVNDB",
        "id": "JVNDB-2024-010550"
      },
      {
        "date": "2024-10-17T17:41:43.017000",
        "db": "NVD",
        "id": "CVE-2024-45273"
      }
    ]
  },
  "title": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/title#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "MB\u00a0CONNECT\u00a0LINE\u00a0 of \u00a0mbnet.mini\u00a0 Vulnerabilities related to cryptographic strength in products from multiple vendors such as firmware",
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2024-010550"
      }
    ],
    "trust": 0.8
  }
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or observed by the user.
  • Confirmed: The vulnerability has been validated from an analyst's perspective.
  • Published Proof of Concept: A public proof of concept is available for this vulnerability.
  • Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
  • Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
  • Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
  • Not confirmed: The user expressed doubt about the validity of the vulnerability.
  • Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.


Loading…

Detection rules are retrieved from Rulezet.

Loading…

Loading…